From 888073e2e83b944721f4b489562b3523298734e5 Mon Sep 17 00:00:00 2001 From: Pauli Date: Mon, 27 May 2024 14:26:45 +1000 Subject: [PATCH] document provider random bypass ability Reviewed-by: Tim Hudson Reviewed-by: Shane Lontis (Merged from https://github.com/openssl/openssl/pull/24498) --- doc/man7/RAND.pod | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/doc/man7/RAND.pod b/doc/man7/RAND.pod index c4a630856c5..ef48a492c4c 100644 --- a/doc/man7/RAND.pod +++ b/doc/man7/RAND.pod @@ -54,6 +54,13 @@ only in exceptional cases and is not recommended, unless you have a profound knowledge of cryptographic principles and understand the implications of your changes. +Finally, it is possible for a provider to bypass the default RAND setup for +L and associated functions. A provider can be specified as the +single randomness source via the L function or via +configuration using the B option in L. Once specified, +the nominated provider will be used directly when calling the L +family of functions. + =head1 DEFAULT SETUP The default OpenSSL RAND method is based on the EVP_RAND deterministic random @@ -68,7 +75,9 @@ L, L, L, L, -L +L, +L, +L. =head1 COPYRIGHT -- 2.47.2